IBM z/VM Using CA VM:Secure Security Technical Implementation Guide

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected]

Details

Version / Release: V1R2

Published: 2018-04-04

Updated At: 2018-09-23 19:13:40

Actions

Download

Filter


Findings
Severity Open Not Reviewed Not Applicable Not a Finding
Overall 0 0 0 0
Low 0 0 0 0
Medium 0 0 0 0
High 0 0 0 0
Drop CKL or SCAP (XCCDF) results here.

    Vuln Rule Version CCI Severity Title Description Status Finding Details Comments
    SV-93547r1_rule IBMZ-VM-000010 CCI-000015 HIGH CA VM:Secure product Rules Facility must be installed and operating. Enterprise environments make account management for operating systems challenging and complex. A manual process for account management functions adds the risk of a potential oversight or other errors. IBM z/VM requires an external security manager to assu
    SV-93549r1_rule IBMZ-VM-000020 CCI-000015 HIGH The IBM z/VM TCP/IP DTCPARMS files must be properly configured to connect to an external security manager. A comprehensive account management process such as provided by External Security Managers (ESM) which includes automation helps to ensure accounts designated as requiring attention are consistently and promptly addressed. Examples include, but are not lim
    SV-93551r1_rule IBMZ-VM-000030 CCI-000018 MEDIUM CA VM:Secure product must be installed and operating. A comprehensive account management process such as provided by an External Security Manager (ESM) which includes automation helps to ensure accounts designated as requiring attention are consistently and promptly addressed. Account management functions i
    SV-93553r2_rule IBMZ-VM-000040 CCI-000044 MEDIUM The IBM z/VM JOURNALING LOGON parameter must be set for lockout after 3 attempts for 15 minutes. By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking the account.
    SV-93555r1_rule IBMZ-VM-000045 CCI-000044 MEDIUM The CA VM:Secure JOURNAL Facility parameters must be set for lockout after 3 attempts. By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking the account.
    SV-93557r1_rule IBMZ-VM-000050 CCI-000048 MEDIUM The IBM z/VM LOGO Configuration file must be configured to display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system. Display of a standardized and approved use notification before granting access to the operating system ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executive Orders, directives, policies, regulations,
    SV-93559r1_rule IBMZ-VM-000060 CCI-000048 MEDIUM The IBM z/VM TCP/IP FTP Server must be configured to display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system and until users acknowledge the usage conditions and take explicit actions to log on for further access. The banner must be acknowledged by the user prior to allowing the user access to the operating system. This provides assurance that the user has seen the message and accepted the conditions for access. If the consent banner is not acknowledged by the user
    SV-93561r1_rule IBMZ-VM-000070 CCI-000050 MEDIUM The IBM z/VM LOGO configuration file must be configured to display the Standard Mandatory DoD Notice and Consent Banner until users acknowledge the usage conditions and take explicit actions to log on for further access. The banner must be acknowledged by the user prior to allowing the user access to the operating system. This provides assurance that the user has seen the message and accepted the conditions for access. If the consent banner is not acknowledged by the user
    SV-93563r1_rule IBMZ-VM-000090 CCI-000067 MEDIUM For FTP processing Z/VM TCP/IP FTP server Exit must be enabled. Remote access services, such as those providing remote access to network devices and information systems, which lack automated monitoring capabilities, increase risk and make remote user access management difficult at best. Remote access is access to DoD
    SV-93565r1_rule IBMZ-VM-000110 CCI-000068 MEDIUM The IBM z/VM TCP/IP configuration must include an SSLSERVERID statement. The Secure Socket Layer (SSL) server, provides processing support for secure (encrypted) communication between remote clients and z/VM TCP/IP application servers that are configured for secure communications The TCP/IP (stack) server routes requests for s
    SV-93567r1_rule IBMZ-VM-000190 CCI-000162 MEDIUM CA VM:Secure product AUDIT file must be restricted to authorized personnel. Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit information includes all information (e.g., audit records, audit settings, audit reports) needed to successfully
    SV-93569r1_rule IBMZ-VM-000320 CCI-000172 MEDIUM The IBM z/VM Journal option must be specified in the Product Configuration File. Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit recor
    SV-93571r1_rule IBMZ-VM-000460 CCI-000185 MEDIUM All digital certificates in use must have a valid path to a trusted Certification authority. Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly trusted. A trust anchor is an authoritative entity represented via a public key and associated data. It is
    SV-93573r1_rule IBMZ-VM-000470 CCI-000186 MEDIUM The IBM z/VM TCP/IP Key database for LDAP or SSL server must be created with the proper permissions. If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the network infrastructure. The cornerstone of the PKI is the private key used to encrypt or digitally sign information. If the privat
    SV-93575r1_rule IBMZ-VM-000480 CCI-000196 HIGH CA VM:Secure product Password Encryption (PEF) option must be properly configured to store and transmit cryptographically-protected passwords. Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily compromised. Satisfies: SRG-OS-000073-GPOS-00041, SRG-OS-0
    SV-93577r1_rule IBMZ-VM-000500 CCI-000199 MEDIUM CA VM:Secure product AUTOEXP record in the Security Config File must be properly set. Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not limit the lifetime of passwords and force users to change their passwords, there is the risk that the op
    SV-93579r1_rule IBMZ-VM-000510 CCI-000200 MEDIUM CA VM:Secure product PASSWORD user exit must be coded with the PWLIST option properly set. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the information system or application allows the user to consecutively reuse their password when that password
    SV-93581r1_rule IBMZ-VM-000520 CCI-000192 MEDIUM IBM zVM CA VM:Secure product PASSWORD user exit must be in use. The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and bru
    SV-93583r1_rule IBMZ-VM-000560 CCI-000381 MEDIUM IBM z/VM must be configured to disable non-essential capabilities. It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooked and therefore may remain unsecured. They increase the ri
    SV-93585r1_rule IBMZ-VM-000590 CCI-000366 MEDIUM CA VM:Secure product Config Delay LOG option must be set to 0. IBM z/VM 6.4.0 made changes to obscure whether a logon is invalid due to the user ID or due to the password. Both the logon prompting sequence and the message HCPLGA050E were changed. However, DELAYLOG causes a delay for a logon with an invalid password t
    SV-93587r1_rule IBMZ-VM-000600 CCI-000213 MEDIUM CA VM:Secure product NORULE record in the SECURITY CONFIG file must be configured to REJECT. To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be properly configured to incorporate access control methods
    SV-93589r1_rule IBMZ-VM-000630 CCI-000382 MEDIUM All IBM z/VM TCP/IP Ports must be restricted to ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments. In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable or restrict unused or unnecessary physical and logical po
    SV-93591r1_rule IBMZ-VM-000650 CCI-000795 MEDIUM The IBM z/VM Security Manager must provide a procedure to disable userIDs after 35 days of inactivity. Inactive identifiers pose a risk to systems and applications because attackers may exploit an inactive identifier and potentially obtain undetected access to the system. Owners of inactive accounts will not notice if unauthorized access to their user acco
    SV-93593r1_rule IBMZ-VM-000660 CCI-000803 HIGH The IBM z/VM TCP/IP VMSSL command operands must be configured properly. VMSSL services are initiated using the VMSSL command defined in the DTCPARMS file. Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be relied upon to provide confidentiality or integr
    SV-93595r1_rule IBMZ-VM-000680 CCI-000804 MEDIUM The IBM z/VM TCP/IP ANONYMOU statement must not be coded in FTP configuration. Operating systems utilizing encryption are required to use FIPS-compliant mechanisms for authenticating to cryptographic modules.
    SV-93597r1_rule IBMZ-VM-000690 CCI-001082 MEDIUM CA VM:Secure product ADMIN GLOBALS command must be restricted to systems programming personnel. Operating system management functionality includes functions necessary for administration and requires privileged user access. Allowing non-privileged users to access operating system management functionality capabilities increases the risk that non-privi
    SV-93599r1_rule IBMZ-VM-000700 CCI-001084 MEDIUM CA VM:Secure must have a security group for Security Administrators only. An isolation boundary provides access control and protects the integrity of the hardware, software, and firmware that perform security functions. Security functions are the hardware, software, and/or firmware of the information system responsible for enf
    SV-93601r1_rule IBMZ-VM-000710 CCI-001090 MEDIUM The IBM z/VM SYSTEM CONFIG file must be configured to clear TDISK on IPL. Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of information, produced by the actions of prior users/roles (or the actions of processes acting on behalf of prior users/roles) from bein
    SV-93603r1_rule IBMZ-VM-000720 CCI-001095 MEDIUM The IBM z/VM TCP/IP FOREIGNIPCONLIMIT statement must be properly configured. DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity. Managing excess capacity ensures that sufficient capacity is available
    SV-93605r1_rule IBMZ-VM-000730 CCI-001095 MEDIUM The IBM z/VM TCP/IP PERSISTCONNECTIONLIMIT statement must be properly configured. DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity. Managing excess capacity ensures that sufficient capacity is available
    SV-93607r1_rule IBMZ-VM-000740 CCI-001095 MEDIUM The IBM z/VM TCP/IP PENDINGCONNECTIONLIMIT statement must be properly configured. DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity. Managing excess capacity ensures that sufficient capacity is available
    SV-93609r1_rule IBMZ-VM-000750 CCI-001199 MEDIUM IBM z/VM tapes must use Tape Encryption. Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive and tape drive, when used for backups) within an operating system. Guest operating systems, such as CMS, that are not capable of ena
    SV-93611r1_rule IBMZ-VM-000760 CCI-001384 MEDIUM The IBM z/VM TCP/IP must be configured to display the mandatory DoD Notice and Consent banner before granting access to the system. Display of a standardized and approved use notification before granting access to the publicly accessible operating system ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executive Orders, directives, po
    SV-93613r1_rule IBMZ-VM-000810 CCI-001464 MEDIUM The IBM z/VM JOURNALING statement must be coded on the configuration file. If auditing is enabled late in the start-up process, the actions of some start-up processes may not be audited. Some audit systems also maintain state information only available if auditing is enabled before a given process is created.
    SV-93615r1_rule IBMZ-VM-000830 CCI-000366 MEDIUM CA VM:Secure product SECURITY CONFIG file must be restricted to appropriate personnel. Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on audit information. Operating systems providing tools
    SV-93617r1_rule IBMZ-VM-000840 CCI-001494 MEDIUM The IBM z/VM AUDT and Journal Mini Disks must be restricted to the appropriate system administrators. Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on audit information. Operating systems providing tools
    SV-93619r1_rule IBMZ-VM-000860 CCI-001682 MEDIUM IBM z/VM must remove or disable emergency accounts after the crisis is resolved or 72 hours. Emergency accounts are privileged accounts that are established in response to crisis situations where the need for rapid account activation is required. Therefore, emergency account activation may bypass normal account authorization processes. If these a
    SV-93621r1_rule IBMZ-VM-000880 CCI-001499 MEDIUM The IBM z/VM must restrict link access to the disk on which system software resides. If the operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust change management process. This requirement a
    SV-93623r1_rule IBMZ-VM-000900 CCI-001812 MEDIUM The IBM z/VM Privilege command class A and Class B must be properly assigned. Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malicious software will be installed on the system. Explicit privileges (escalated or administrative privileges) provide the regular use
    SV-93625r1_rule IBMZ-VM-000910 CCI-001813 MEDIUM CA VM:Secure AUTHORIZ CONFIG file must be properly configured. Failure to provide logical access restrictions associated with changes to system configuration may have significant effects on the overall security of the system. When dealing with access restrictions pertaining to change control, it should be noted that
    SV-93627r1_rule IBMZ-VM-000930 CCI-001849 MEDIUM The IBM z/VM journal minidisk space allocation must be large enough for one weeks worth of audit records. In order to ensure operating systems have a sufficient storage capacity in which to write the audit logs, operating systems need to be able to allocate audit record storage capacity. The task of allocating audit record storage capacity is usually perform
    SV-93629r1_rule IBMZ-VM-000940 CCI-001851 MEDIUM CA VM:Secure product audit records must offload audit records to a different system or media. Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
    SV-93631r1_rule IBMZ-VM-000950 CCI-001851 MEDIUM CA VM:Secure product audit records must be offloaded on a weekly basis. Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
    SV-93633r1_rule IBMZ-VM-000960 CCI-001967 MEDIUM The IBM z/VM Portmapper server virtual machine userID must be included in the AUTOLOG statement of the TCP/IP server configuration file. Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Bidirectional authentication provides stronger safeguards to validate the identity of other devices for connections that are of gre
    SV-93635r1_rule IBMZ-VM-000980 CCI-002165 MEDIUM CA VM:Secure product MANAGE command must be restricted to system administrators. Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in which mode (e.g., read or write). Ownership is usually acquired
    SV-93637r1_rule IBMZ-VM-000990 CCI-002233 MEDIUM The CA VM:Secure LOGONBY command must be restricted to system administrators. In certain situations, software applications/programs need to execute with elevated privileges to perform required functions. However, if the privileges required for execution are at a higher level than the privileges assigned to organizational users invo
    SV-93639r1_rule IBMZ-VM-001010 CCI-002235 MEDIUM The IBM z/VM CP Privilege Class A, B, and D must be restricted to appropriate system operators. Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privileged functions include, for example, establishing accounts,
    SV-93641r2_rule IBMZ-VM-001020 CCI-002238 MEDIUM The IBM z/VM JOURNALING statement must be properly configured. By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the account.
    SV-93643r1_rule IBMZ-VM-001040 CCI-002420 MEDIUM The IBM z/VM TCP/IP SECUREDATA option for FTP must be set to REQUIRED. Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for example, during aggregation, at protocol transformation points, and during packing/unpacking. These unauthorized disclosures or modific
    SV-93645r1_rule IBMZ-VM-001060 CCI-002314 MEDIUM IBM z/VM TCP/IP config file INTERNALCLIENTPARMS statement must be properly configured. Remote access services, such as those providing remote access to network devices and information systems, which lack automated control capabilities, increase risk and make remote user access management difficult at best. Remote access is access to DoD no
    SV-93647r1_rule IBMZ-VM-001070 CCI-002420 MEDIUM All IBM z/VM TCP/IP servers must be configured for SSL/TLS connection. Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for example, during aggregation, at protocol transformation points, and during packing/unpacking. These unauthorized disclosures or modific
    SV-93649r1_rule IBMZ-VM-001090 CCI-002422 MEDIUM The IBM z/VM TCP/IP SECURETELNETCLIENT option for telnet must be set to YES. Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for example, during aggregation, at protocol transformation points, and during packing/unpacking. These unauthorized disclosures or modific
    SV-93651r1_rule IBMZ-VM-001110 CCI-002465 MEDIUM The IBM z/VM TCP/IP NSLOOKUP statement for UFT servers must be properly configured. If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercepted without the resolver's knowledge, or resource records
    SV-93653r1_rule IBMZ-VM-001120 CCI-002465 MEDIUM The IBM z/VM TCP/IP DOMAINLOOKUP statement must be properly configured. If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercepted without the resolver's knowledge, or resource records
    SV-93655r1_rule IBMZ-VM-001130 CCI-002465 MEDIUM The IBM z/VM TCP/IP NSINTERADDR statement must be present in the TCPIP DATA configuration. If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercepted without the resolver's knowledge, or resource records
    SV-93657r1_rule IBMZ-VM-001140 CCI-002466 MEDIUM The IBM z/VM CHECKSUM statement must be included in the TCP/IP configuration file. If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercepted without the resolver's knowledge, or resource records
    SV-93659r1_rule IBMZ-VM-001150 CCI-002468 MEDIUM The IBM z/VM DOMAINSEARCH statement in the TCPIP DATA file must be configured with proper domain names for name resolution. If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercepted without the resolver's knowledge, or resource records
    SV-93661r1_rule IBMZ-VM-001190 CCI-002235 MEDIUM The IBM z/VM Privilege Classes C and E must be restricted to appropriate system administrators. Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privileged functions include, for example, establishing accounts,
    SV-93663r1_rule IBMZ-VM-001200 CCI-002235 MEDIUM The IBM z/VM Privilege Class F must be restricted to service representatives and system administrators only. Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privileged functions include, for example, establishing accounts,
    SV-93665r1_rule IBMZ-VM-001210 CCI-002235 MEDIUM The IBM z/VM ANY Privilege Class must not be listed for privilege commands. Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privileged functions include, for example, establishing accounts,
    SV-93667r1_rule IBMZ-VM-001220 CCI-000366 MEDIUM CA VM:Secure product VMXRPI configuration file must be restricted to authorized personnel. Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security baseline across DoD that reflects the most restrictive secur
    SV-93669r1_rule IBMZ-VM-001230 CCI-000366 MEDIUM CA VM:Secure product DASD CONFIG file must be restricted to appropriate personnel. Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security baseline across DoD that reflects the most restrictive secur
    SV-93671r1_rule IBMZ-VM-001240 CCI-000366 MEDIUM CA VM:Secure product AUTHORIZ CONFIG file must be restricted to appropriate personnel. Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security baseline across DoD that reflects the most restrictive secur
    SV-93673r1_rule IBMZ-VM-001250 CCI-000366 MEDIUM CA VM:Secure product CONFIG file must be restricted to appropriate personnel. Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the system that affect the security posture and/or functionality of the system. Security-related parameters are those parameters impactin
    SV-93675r1_rule IBMZ-VM-001270 CCI-000366 MEDIUM CA VM:Secure Product SFS configuration file must be restricted to appropriate personnel. Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security baseline across DoD that reflects the most restrictive secur
    SV-93677r1_rule IBMZ-VM-001280 CCI-000366 MEDIUM CA VM:Secure product Rules Facility must be restricted to appropriate personnel. Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security baseline across DoD that reflects the most restrictive secur
    SV-93679r1_rule IBMZ-VM-002330 CCI-000366 MEDIUM IBM z/VM must employ a Session manager. A session manager controls the semi-permanent interactive information interchange, also known as a dialogue, between a user and z/VM. Without the use of a session manager these semi-permanent interchanges can be open to compromise and attacks.
    SV-93681r1_rule IBMZ-VM-002340 CCI-000366 MEDIUM The IBM z/VM System administrator must develop a notification routine for account management. Information system accounts are utilized for identifying individual users or for identifying the operating system processes themselves. In order to detect and respond to events affecting user accessibility and system processing, operating systems must not
    SV-93683r1_rule IBMZ-VM-002350 CCI-000366 MEDIUM The IBM z/VM system administrator must develop routines and processes for the proper configuration and maintenance of Software. Proper configuration management procedures for information systems provide for the proper configuration and maintenance in accordance with local policies restrictions and/or rules. Failure to properly configure and maintain system software and application
    SV-93685r1_rule IBMZ-VM-002360 CCI-000366 MEDIUM IBM z/VM must be protected by an external firewall that has a deny-all, allow-by-exception policy. Firewalls protect computers from network attacks by blocking or limiting access to open network ports. Firewalls provide monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other u
    SV-93687r1_rule IBMZ-VM-002370 CCI-000366 MEDIUM The IBM z/VM System administrator must develop routines and processes for notification in the event of audit failure. Audit processing failures include, for example, software/hardware errors, failures in the audit capturing mechanisms, and audit storage capacity being reached or exceeded. Without proper notification vital audit records may be lost.
    SV-93689r1_rule IBMZ-VM-002380 CCI-000366 MEDIUM The IBM z/VM system administrator must develop procedures maintaining information system operation in the event of anomalies. If anomalies are not acted upon, security functions may fail to secure the system.
    SV-93691r1_rule IBMZ-VM-002390 CCI-000366 MEDIUM IBM z/VM system administrator must develop procedures to manually control temporary, interactive, and emergency accounts. Proper handling of temporary, inactive, and emergency accounts require automatic notification and action rather than at the convenience of the systems administrator. However in the absence of automated process manual procedures must be in place to assure
    SV-93693r1_rule IBMZ-VM-002400 CCI-000366 MEDIUM IBM z/VM must have access to an audit reduction tool that allows for central data review and analysis. Audit reduction is a process that manipulates collected audit information and organizes such information in a summary format that is more meaningful to analysts. Audit reduction and report generation capabilities do not always emanate from the same inform
    SV-93695r1_rule IBMZ-VM-002410 CCI-000366 MEDIUM The IBM z/VM system administrator must develop and perform a procedure to validate the correct operation of security functions. Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed. Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing the
    SV-93697r1_rule IBMZ-VM-002420 CCI-000366 MEDIUM IBM z/VM must employ Clock synchronization software. Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the correct time a particular event occurred on a system is critical when conducting forensic analysis and investigating system events. S
    SV-93699r1_rule IBMZ-VM-002430 CCI-000366 MEDIUM The IBM z/VM systems requiring data at rest must employ IBMs DS8000 for full disk encryption. Operating systems handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest. Selection of a cryptographic mechanism is based on the need to prote